diff --git a/apps/dashboard-app/src/main/resources/reference.conf b/apps/dashboard-app/src/main/resources/reference.conf
index 696a10239..2a58a7b60 100644
--- a/apps/dashboard-app/src/main/resources/reference.conf
+++ b/apps/dashboard-app/src/main/resources/reference.conf
@@ -1,52 +1,52 @@
 shrine {
   dashboard {
     gruntWatch = false //false for production, true for mvn tomcat7:run . Allows the client javascript and html files to be loaded via gruntWatch .
     happyBaseUrl = "http://localhost:6060/shrine/rest/happy"
     remoteDashboard {
       protocol = "https://"
-      port = 6443
+      port = ":6443"
     }
   }
 
   pmEndpoint {
     url = "http://changeme.com/i2b2/services/PMService/getServices" //"http://services.i2b2.org/i2b2/services/PMService/getServices"
     acceptAllCerts = true
     timeout {
       seconds = 10
     }
   }
 
   authenticate {
     realm = "SHRINE Steward API"
     usersource
       {
         type = "PmUserSource" //Must be ConfigUserSource (for isolated testing) or PmUserSource (for everything else)
         domain = "set shrine.authenticate.usersource.domain to the PM authentication domain in dashboard.conf" //"i2b2demo"
       }
   }
 
   // If the pmEndpoint acceptAllCerts = false then you need to supply a keystore
   // Or if you would like dashboard-to-dashboard comms to work.
   //  keystore {
   //    file = "shrine.keystore"
   //    password = "chiptesting"
   //    privateKeyAlias = "test-cert"
   //    keyStoreType = "JKS"
   //    caCertAliases = [carra ca]
   //  }
 }
 
 //todo typesafe config precedence seems to do the right thing, but I haven't found the rules that say this reference.conf should override others
 akka {
   loglevel = INFO
 
   //  log-config-on-start = on
   loggers = ["akka.event.slf4j.Slf4jLogger"]
   //  logging-filter = "akka.event.slf4j.Slf4jLoggingFilter"
 }
 
 spray.servlet {
   boot-class = "net.shrine.dashboard.Boot"
   request-timeout = 30s
 }
 
diff --git a/apps/dashboard-app/src/main/scala/net/shrine/dashboard/DashboardService.scala b/apps/dashboard-app/src/main/scala/net/shrine/dashboard/DashboardService.scala
index 57f7c5740..d9e805658 100644
--- a/apps/dashboard-app/src/main/scala/net/shrine/dashboard/DashboardService.scala
+++ b/apps/dashboard-app/src/main/scala/net/shrine/dashboard/DashboardService.scala
@@ -1,197 +1,197 @@
 package net.shrine.dashboard
 
 import akka.actor.{ActorSystem, Actor}
 import akka.event.Logging
 import net.shrine.authentication.UserAuthenticator
 
 import net.shrine.authorization.steward.OutboundUser
 import net.shrine.dashboard.jwtauth.ShrineJwtAuthenticator
 import net.shrine.i2b2.protocol.pm.User
 import net.shrine.dashboard.httpclient.HttpClientDirectives.{forwardUnmatchedPath,requestUriThenRoute}
 import net.shrine.log.Loggable
 import shapeless.HNil
 
 import spray.http.{Uri, HttpResponse, HttpRequest, StatusCodes}
 import spray.httpx.Json4sSupport
 import spray.routing.directives.LogEntry
 import spray.routing.{AuthenticationFailedRejection, Rejected, RouteConcatenation, Directive0, Route, HttpService}
 
 import org.json4s.{DefaultFormats, Formats}
 
 import scala.concurrent.ExecutionContext.Implicits.global
 
 // we don't implement our route structure directly in the service actor because
 // we want to be able to test it independently, without having to spin up an actor
 
 class DashboardServiceActor extends Actor with DashboardService {
 
   // the HttpService trait defines only one abstract member, which
   // connects the services environment to the enclosing actor or test
   def actorRefFactory = context
 
   // this actor only runs our route, but you could add
   // other things here, like request stream processing
   // or timeout handling
   def receive = runRoute(route)
 }
 
 
 // this trait defines our service behavior independently from the service actor
 trait DashboardService extends HttpService with Json4sSupport with Loggable {
   implicit def json4sFormats: Formats = DefaultFormats
 
   val userAuthenticator = UserAuthenticator(DashboardConfigSource.config)
 
   //don't need to do anything special for unauthorized users, but they do need access to a static form.
   lazy val route:Route = gruntWatchCorsSupport{
     redirectToIndex ~ staticResources ~ makeTrouble ~ about ~ authenticatedInBrowser ~ authenticatedDashboard
   }
 
   // logs just the request method, uri and response at info level
   def logEntryForRequestResponse(req: HttpRequest): Any => Option[LogEntry] = {
     case res: HttpResponse => {
       Some(LogEntry(s"\n  Request: $req \n  Response: $res", Logging.InfoLevel))
     }
     case _ => None // other kind of responses
   }
 
   // logs just the request method, uri and response status at info level
   def logEntryForRequest(req: HttpRequest): Any => Option[LogEntry] = {
     case res: HttpResponse => {
       Some(LogEntry(s"\n  Request: $req \n  Response status: ${res.status}", Logging.InfoLevel))
     }
     case _ => None // other kind of responses
   }
 
   //pathPrefixTest shields the QEP code from the redirect.
   def authenticatedInBrowser: Route = pathPrefixTest("user"|"admin"|"toDashboard") {
     logRequestResponse(logEntryForRequestResponse _) { //logging is controlled by Akka's config, slf4j, and log4j config
       reportIfFailedToAuthenticate {
         authenticate(userAuthenticator.basicUserAuthenticator) { user =>
           pathPrefix("user") {
             userRoute(user)
           } ~
           pathPrefix("admin") {
             adminRoute(user)
           } ~
           pathPrefix("toDashboard") {
             toDashboardRoute(user)
           }
         }
       }
     }
   }
 
   val reportIfFailedToAuthenticate = routeRouteResponse {
     case Rejected(List(AuthenticationFailedRejection(_,_))) =>
       complete("AuthenticationFailed")
   }
 
   def authenticatedDashboard:Route = pathPrefix("fromDashboard") {
     logRequestResponse(logEntryForRequestResponse _) { //logging is controlled by Akka's config, slf4j, and log4j config
       get { //all remote dashboard calls are gets.
         authenticate(ShrineJwtAuthenticator.authenticate) { user =>
           adminRoute(user)
         }
       }
     }
   }
 
   def makeTrouble = pathPrefix("makeTrouble") {
     complete(throw new IllegalStateException("fake trouble"))
   }
 
   lazy val redirectToIndex = pathEnd {
     redirect("shrine-dashboard/client/index.html", StatusCodes.PermanentRedirect) //todo pick up "shrine-dashboard" programatically
     } ~
     ( path("index.html") | pathSingleSlash) {
       redirect("client/index.html", StatusCodes.PermanentRedirect)
   }
 
   lazy val staticResources = pathPrefix("client") {
     pathEnd {
       redirect("client/index.html", StatusCodes.PermanentRedirect)
     } ~
       pathSingleSlash {
         redirect("index.html", StatusCodes.PermanentRedirect)
       } ~ {
       getFromResourceDirectory("client")
     }
   }
 
   lazy val about = pathPrefix("about") {
     complete("Nothing here yet") //todo
   }
 
   def userRoute(user:User):Route = get {
     pathPrefix("whoami") {
       complete(OutboundUser.createFromUser(user))
     }
   }
 
   //todo is this an admin? Does it matter?
   def adminRoute(user:User):Route = get {
     implicit val system = ActorSystem("sprayServer")
 
     pathPrefix("happy") {
       val happyBaseUrl: String = DashboardConfigSource.config.getString("shrine.dashboard.happyBaseUrl")
 
       forwardUnmatchedPath(happyBaseUrl)
     } ~
     pathPrefix("messWithHappyVersion") {
       val happyBaseUrl: String = DashboardConfigSource.config.getString("shrine.dashboard.happyBaseUrl")
 
       def pullClasspathFromConfig(httpResponse:HttpResponse,uri:Uri):Route = {
         ctx => {
           val result = httpResponse.entity.asString
           ctx.complete(s"Got '$result' from $uri")
         }
       }
 
       requestUriThenRoute(happyBaseUrl+"/version",pullClasspathFromConfig)
     } ~
     pathPrefix("ping") {complete("pong")} //ping test
   }
 
   def toDashboardRoute(user:User):Route = get {
     implicit val system = ActorSystem("sprayServer")
 
     pathPrefix(Segment) { dnsName =>
       val remoteDashboardProtocol = DashboardConfigSource.config.getString("shrine.dashboard.remoteDashboard.protocol")
       val remoteDashboardPort = DashboardConfigSource.config.getString("shrine.dashboard.remoteDashboard.port")
 
-      val baseUrl = s"$remoteDashboardProtocol$dnsName:$remoteDashboardPort"
+      val baseUrl = s"$remoteDashboardProtocol$dnsName$remoteDashboardPort"
 
       forwardUnmatchedPath(baseUrl,Some(ShrineJwtAuthenticator.createAuthHeader))
     }
   }
 }
 
 //adapted from https://gist.github.com/joseraya/176821d856b43b1cfe19
 object gruntWatchCorsSupport extends Directive0 with RouteConcatenation {
 
   import spray.http.HttpHeaders.{`Access-Control-Allow-Methods`, `Access-Control-Max-Age`, `Access-Control-Allow-Headers`,`Access-Control-Allow-Origin`}
   import spray.routing.directives.RespondWithDirectives.respondWithHeaders
   import spray.routing.directives.MethodDirectives.options
   import spray.routing.directives.RouteDirectives.complete
   import spray.http.HttpMethods.{OPTIONS,GET,POST}
   import spray.http.AllOrigins
 
   private val allowOriginHeader = `Access-Control-Allow-Origin`(AllOrigins)
   private val optionsCorsHeaders = List(
     `Access-Control-Allow-Headers`("Origin, X-Requested-With, Content-Type, Accept, Accept-Encoding, Accept-Language, Host, Referer, User-Agent, Authorization"),
     `Access-Control-Max-Age`(1728000)) //20 days
 
   val gruntWatch:Boolean = DashboardConfigSource.config.getBoolean("shrine.dashboard.gruntWatch")
 
   override def happly(f: (HNil) => Route): Route = {
     if(gruntWatch) {
       options {
         respondWithHeaders(`Access-Control-Allow-Methods`(OPTIONS, GET, POST) ::  allowOriginHeader :: optionsCorsHeaders){
           complete(StatusCodes.OK)
         }
       } ~ f(HNil)
     }
     else f(HNil)
   }
 }
diff --git a/apps/dashboard-app/src/main/scala/net/shrine/dashboard/jwtauth/ShrineJwtAuthenticator.scala b/apps/dashboard-app/src/main/scala/net/shrine/dashboard/jwtauth/ShrineJwtAuthenticator.scala
index 3d1b40067..39612af60 100644
--- a/apps/dashboard-app/src/main/scala/net/shrine/dashboard/jwtauth/ShrineJwtAuthenticator.scala
+++ b/apps/dashboard-app/src/main/scala/net/shrine/dashboard/jwtauth/ShrineJwtAuthenticator.scala
@@ -1,136 +1,136 @@
 package net.shrine.dashboard.jwtauth
 
 import java.security.PrivateKey
 import java.security.cert.{CertificateNotYetValidException, CertificateExpiredException, X509Certificate}
 import java.util.Date
 
 import io.jsonwebtoken.{SignatureAlgorithm, ExpiredJwtException, Claims, Jwts}
 import net.shrine.crypto.{KeyStoreDescriptorParser, KeyStoreCertCollection}
 import net.shrine.dashboard.DashboardConfigSource
 import net.shrine.i2b2.protocol.pm.User
 import net.shrine.log.Loggable
 import net.shrine.protocol.{CertId, Credential}
 import spray.http.HttpHeaders.{RawHeader, Authorization, `WWW-Authenticate`}
 import spray.http.{HttpHeader, HttpChallenge}
 import spray.routing.AuthenticationFailedRejection.{CredentialsMissing, CredentialsRejected}
 import spray.routing.AuthenticationFailedRejection
 import spray.routing.authentication._
 
 import scala.concurrent.{Future, ExecutionContext}
 
 /**
   * An Authenticator that uses Jwt in a ShrineJwt1 header to authenticate. See http://jwt.io/introduction/ for what this is all about,
   * https://tools.ietf.org/html/rfc7519 for what it might include for claims.
   *
   * @author david 
   * @since 12/21/15
   */
 object ShrineJwtAuthenticator extends Loggable{
 
   val ShrineJwtAuth0 = "ShrineJwtAuth0" //We can't use Authorization: Bearer because we have to know which public key to use to decrypt, and we want the caller to authenticate via PGP from the start
   val challengeHeader:`WWW-Authenticate` = `WWW-Authenticate`(HttpChallenge(ShrineJwtAuth0, "dashboard-to-dashboard"))
 
   //from https://groups.google.com/forum/#!topic/spray-user/5DBEZUXbjtw
   def authenticate(implicit ec: ExecutionContext): ContextAuthenticator[User] = { ctx =>
 
     Future {
       val missingCredentials: Authentication[User] = Left(AuthenticationFailedRejection(CredentialsMissing, List(challengeHeader)))
       val rejectedCredentials: Authentication[User] =  Left(AuthenticationFailedRejection(CredentialsRejected,List(challengeHeader)))
 
       ctx.request.headers.find(_.name.equals(Authorization.name)).fold(missingCredentials) { (header: HttpHeader) =>
 
-        //header should be "$ShrineJwtAuth0: $SignerSerialNumber: $JwtsString
-        val splitHeaderValue: Array[String] = header.value.split(": ")
+        //header should be "$ShrineJwtAuth0 $SignerSerialNumber $JwtsString
+        val splitHeaderValue: Array[String] = header.value.split(" ")
         if (splitHeaderValue.length == 3) {
 
           if (splitHeaderValue(0) == ShrineJwtAuth0) {
             try {
               val certSerialNumber: BigInt = BigInt(splitHeaderValue(1))
 
               val config = DashboardConfigSource.config
 
               val shrineCertCollection: KeyStoreCertCollection = KeyStoreCertCollection.fromFileRecoverWithClassPath(KeyStoreDescriptorParser(config.getConfig("shrine.keystore")))
 
               shrineCertCollection.get(CertId(certSerialNumber.bigInteger)).fold{
                 info(s"Cert serial number ${certSerialNumber.bigInteger} could not be found in the KeyStore.")
                 rejectedCredentials
               } { (certificate: X509Certificate) =>
 
                 val now = new Date()
                 //check date on cert vs time. throws CertificateExpiredException or CertificateNotYetValidException for problems
 //todo skip this until you rebuild the certs used for testing                certificate.checkValidity(now)
 
                 val key = certificate.getPublicKey
                 val jwtsClaims: Claims = Jwts.parser().setSigningKey(key).parseClaimsJws(splitHeaderValue(2)).getBody
 
                 //todo check serial number vs jwts iss
                 if(jwtsClaims.getIssuer != splitHeaderValue(1)) {
                   info(s"jwts issuer ${jwtsClaims.getIssuer} does not match signing cert serial number ${splitHeaderValue(1)}")
                   rejectedCredentials
                 }
                 //todo check exp vs time
                 else if (jwtsClaims.getExpiration.before(now)) {
                   info(s"jwts experation ${jwtsClaims.getExpiration} expired before now $now")
                   rejectedCredentials
                 }
                 else {
                   val user = User(
                     fullName = certificate.getSubjectDN.getName,
                     username = jwtsClaims.getSubject,
                     domain = "dashboard-to-dashboard",
                     credential = Credential("Dashboard credential", isToken = false),
                     params = Map(),
                     rolesByProject = Map()
                   )
                   Right(user)
                 }
               }
             } catch {
               case x:NumberFormatException => {
                 info(s"Cert serial number ${splitHeaderValue(1)} could not be read as a BigInteger.",x)
                 missingCredentials
               }
               case x:CertificateExpiredException => {
                 info(s"Cert ${splitHeaderValue(1)} expired.",x)
                 rejectedCredentials
               }
               case x:CertificateNotYetValidException => {
                 info(s"Cert ${splitHeaderValue(1)} not yet valid.",x)
                 rejectedCredentials
               }
               case x:ExpiredJwtException => {
                 info(s"Jwt from ${splitHeaderValue(1)} expired.",x)
                 rejectedCredentials
               }
             }
           }
           else {
             info(s"Header did not start with $ShrineJwtAuth0 .")
             missingCredentials
           }
         }
         else {
           info(s"Header had ${splitHeaderValue.length} :-delimited segments, not 3. ")
           missingCredentials
         }
       }
     }
   }
 
   def createAuthHeader:HttpHeader = {
     val config = DashboardConfigSource.config
     val shrineCertCollection: KeyStoreCertCollection = KeyStoreCertCollection.fromFileRecoverWithClassPath(KeyStoreDescriptorParser(config.getConfig("shrine.keystore")))
 
     val signerSerialNumber = shrineCertCollection.myCertId.get.serial
     val key: PrivateKey = shrineCertCollection.myKeyPair.privateKey
     val expiration:Date = new Date(System.currentTimeMillis() + 30 * 1000) //good for 30 seconds
     val jwtsString = Jwts.builder().
                             setIssuer(signerSerialNumber.toString()).
                             setSubject(java.net.InetAddress.getLocalHost.getHostName).
                             setExpiration(expiration).
                           signWith(SignatureAlgorithm.RS512, key).
                           compact()
-    RawHeader(Authorization.name,s"$ShrineJwtAuth0: $signerSerialNumber: $jwtsString")
+    RawHeader(Authorization.name,s"$ShrineJwtAuth0 $signerSerialNumber $jwtsString")
   }
 
 }
\ No newline at end of file